The ASR Post-Processor Performance Challenges of BackTranScription (BTS): Data-Centric and Model-Centric Approaches
نویسندگان
چکیده
Training an automatic speech recognition (ASR) post-processor based on sequence-to-sequence (S2S) requires a parallel pair (e.g., result and human post-edited sentence) to construct the dataset, which demands great amount of labor. BackTransScription (BTS) proposes data-building method mitigate limitations existing S2S ASR post-processors, can automatically generate vast amounts training datasets, reducing time cost in data construction. Despite emergence this novel approach, BTS-based still has research challenges is mostly untested diverse approaches. In study, we highlight these through detailed experiments by analyzing data-centric approach (i.e., controlling without model alteration) model-centric modification). other words, attempt point out problems with current trend pursuing alert against ignoring importance data. Our experiment results show that outperformed +11.69, +17.64, +19.02 F1-score, BLEU, GLEU tests.
منابع مشابه
Data - centric , without data model
alizing large 3D data sets from scientific or medical applications. Transfer functions are particularly important to the quality of direct volume-rendered images. A transfer function assigns optical properties, such as color and opacity, to original values of the data set being visualized. Unfortunately, finding good transfer functions proves difficult. Pat Hanrahan called it one of the top 10 ...
متن کاملData - Centric Approaches to Kernel Malware Defense
Rhee, Junghwan Ph.D., Purdue University, August 2011. Data-Centric Approaches to Kernel Malware Defense. Major Professor: Dongyan Xu. An operating system kernel is the core of system software which is responsible for the integrity and operations of a conventional computer system. Authors of malicious software (malware) have been continuously exploring various attack vectors to tamper with the k...
متن کاملData - Centric Approaches to Kernel Malware
Rhee, Junghwan Ph.D., Purdue University, August 2011. Data-Centric Approaches to Kernel Malware Defense. Major Professor: Dongyan Xu. An operating system kernel is the core of system software which is responsible for the integrity and operations of a conventional computer system. Authors of malicious software (malware) have been continuously exploring various attack vectors to tamper with the k...
متن کاملPerformance Analysis of User-Centric Network Selection and Network-Centric Resource Allocation Approaches in Wireless Networks
The possible leveraging of high deployment costs, and the possibility to increase revenue have also introduced the concept of network sharing between different operators. On the other hand, the realization of a user-centric paradigm in future heterogeneous wireless networks, which implies free and automatic choice among different available wireless and mobile access networks, will revolutionize...
متن کاملObservation Centric Sensor Data Model
Management of sensor data requires metadata to understand the semantics of observations. While e-science researchers have high demands on metadata, they are selective in entering metadata. The claim in this paper is to focus on the essentials, i.e., the actual observations being described by location, time, owner, instrument, and measurement. The applicability of this approach is demonstrated i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Mathematics
سال: 2022
ISSN: ['2227-7390']
DOI: https://doi.org/10.3390/math10193618